Distributed budgeting and accounting system with secure token device access
First Claim
1. In a computer network, a computerized method, comprising the steps of:
- providing a budget for an organization that identifies quantities of funds to be distributed to components of the organization for a budgeting time period;
providing secure token devices for the components of the organization; and
electronically distributing the funds to the components of the organization according to the budget by performing transfers of the funds between the secure token devices.
2 Assignments
0 Petitions
Accused Products
Abstract
A distributed budgeting and accounting system is designed to operate with secure token devices. The secure token devices serve both as electronic currency purses and as secure vehicles for authorization. The distributed budgeting and accounting system allows a budget to be defined for an organization. The budget is implemented via the secure token devices by transferring electronic currency tokens representing portions of the budgets to secure token devices associated with different portions of the organization. The funds may be transferred down a hierarchical organization by transferring funds between respective pairs of secure token devices. Once the budget has been fully distributed, members of the organization may spend electronic currency tokens on their secure token devices to cover the cost of using resources. Each card holder of the secure token device may only spend up to the amount provided on the associated secure token device. Secure token devices may be provided for service providers so that these funds that are spent to cover the use of resources may be accumulated to it. Accumulated funds may be returned to a central bank. The distributed budgeting and accounting system is used to define an internal economy for the organization.
218 Citations
61 Claims
-
1. In a computer network, a computerized method, comprising the steps of:
-
providing a budget for an organization that identifies quantities of funds to be distributed to components of the organization for a budgeting time period;
providing secure token devices for the components of the organization; and
electronically distributing the funds to the components of the organization according to the budget by performing transfers of the funds between the secure token devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. In a computer network wherein components of an organization have associated secure token devices, a computer-readable medium holding computer-executable instructions for performing a method comprising the steps of:
-
defining a budget for the organization that identifies quantities of funds to be distributed to components of the organization for a budgeting time period; and
facilitating electronic distribution of the funds to the components of the organization according to the budget by performing transfers of the funds between the secure token devices. - View Dependent Claims (12, 13)
-
-
14. In a computer network that provides computing resources for an organization having resource consumers, a method comprising the steps of:
-
receiving a request on behalf of a selected one of the resource consumers to use a given one of the computing resources;
requesting payment for use of the given computing resource by the selected resource consumers; and
receiving electronic payment for the use of the given computing resource from the selected resource consumers. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. In a computer network that provides computing resources for an organization having members a computer-readable medium holding computer-executable instructions for performing a method comprising the steps of:
-
receiving a request on behalf of a selected one of the members to use a given one of the computing resources;
requesting payment for use of the given computing resource by the selected member; and
receiving electronic payment for the use of the given computing resource from the selected member. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. In a computing environment wherein secure token devices for a hierarchical organization having multiple levels paying from highest to lowest are associated with a central bank, levels of the organization and service providers that provide services, a method comprising the computer-implemented steps of:
-
providing a budget that identifies how many funds are granted to the levels of the organization for a budgetary period;
transferring electronic funds from the secure token device associated with the central bank to the secure token devices associated with at least some of the levels of the organization to realize distribution of the budget;
distributing at least some of the funds from a selected secure token device associated with one of the levels of a given secure token device associated with the lowest level of the organization; and
transferring funds from the given secure token device to one of the secure token devices associated with a selected one of the service providers to pay for services provided by the selected service provider. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. In a computer network in an organization having computer resources, a computer-implemented method comprising the steps of:
-
obtaining identification information from a secure token device to determine whether a user is permitted to connect to the computer network;
based on the identification information permitting the user to connect to the computer network;
checking at least one role assigned to the user, wherein each role has rights for accessing the first of the computer resources;
receiving electronic currency tokens from the secure token device of the user as payment for access to a first of the computer resources based on the checking of at least one role assigned to the user; and
granting the user access to the first of the computer resources. - View Dependent Claims (36, 37)
-
-
38. In a computer network in an organization having computer resources, a computer-readable medium holding computer-executable instructions for performing a method, comprising the steps of:
-
obtaining identification information from a secure token device to determine whether a user is permitted to connect to the computer network based on the identification information permitting the user to connect to the computer network;
checking at least one role assigned to the user, wherein each role has rights for accessing the first of the computer resources;
receiving electronic currency tokens from the secure token device of the user as payment for access to a first of the computer resources based on the checking of at least one role assigned to the user; and
granting the user access to the first of the computer resources.
-
-
39. In a distributed computer system in an organization having resources where a secure token device holds currency tokens that constitute a portion of a budget allocated to pay for use of the resources, a method comprising the computer-implemented steps of:
-
providing an application program for dispersing currency tokens to the secure token device in the organization;
activating the application program; and
with the application program, dispersing additional currency tokens to the secure token device in the organization. - View Dependent Claims (40, 41)
-
-
42. A system, comprising:
-
a server computer system for providing a service to a user;
a user computer system for use by the user to gain access to the service provided by the server;
a first secure token device reader coupled to the user computer system for receiving a secure token device and communicating with the secure token device; and
an access component for granting the user access to the system when the user places a valid secure token device in the first secure token device reader. - View Dependent Claims (43, 44, 45, 46, 47)
-
-
48. A distributed computer system resource comprising:
-
at least one processor for running;
a budgeting component for establishing a budget for an organization that is hierarchically organized into levels and for distributing electronic currency to secure token devices provided for respective levels of the organization; and
a commerce component for facilitating exchange of electronic currency as payment for use of the resources. - View Dependent Claims (49, 50)
-
-
51. A computer network, comprising:
-
means for providing a budget for an organization that identifies quantities of funds to be distributed to components of the organization for a budgeting time period;
secure token devices for the components of the organization;
means for electronically distributing the funds to the components of the organization according to the budget by performing transfers of funds between the secure token devices. - View Dependent Claims (52, 53)
-
-
54. In a computer network having computing resources, a system comprising:
-
means for obtaining identification information from a secure token device to determine whether a user is permitted to connect to the computer network;
means for permitting the user to connect to the computer network based on the identification information;
means for checking at least one role assigned to the user, wherein each role has rights for accessing the first of the computer resources;
means for receiving electronic currency tokens from the secure token device of the user as payment for access to a first of the computer resources based on the checking of at least one role assigned to the user; and
means for granting the user access to the first of the computer resources. - View Dependent Claims (55, 56)
-
-
57. A secure token device adapted to transmitting identification information for a user to a computer system, receiving a request for electronic currency tokens form the computer system as payment for access to computer resources, checking at least one role assigned to the user, wherein each role have rights for accessing computer resources;
- transmitting the electronic currency tokens to the computer system as payment for access to the computer resources based on the checking of at least one role assigned to the user and receiving approval to access the computer resources.
- View Dependent Claims (58)
-
59. A medium over which communication signals travel, said signals containing computer-executable instructions for performing a method in a computer network of an organization wherein components have associated secure token devices, comprising the steps of:
-
defining a budget for the organization that identifies quantities of funds to be distributed to components of the organization for a budgeting time period; and
facilitating electronic distribution of the funds to the components of the organization according to the budget by performing transfers of the funds between the secure token devices. - View Dependent Claims (60)
-
-
61. A medium over which communication signals travel, said signals containing computer executable instructions for performing a method in a computer network that provides computer resources for an organization having resource consumers, comprising the steps of:
-
receiving a request on behalf of a selected one of the resource consumers to use a given one of the computing resources;
checking at least one role assigned to the user, wherein each role has rights for accessing the given one of the computing resources;
requesting payment for use of the given computing resource by the selected resource consumers based on the checking of at least one role assigned to the user; and
receiving electronic payment for the use of the given computing resource from the selected resource consumers based on the checking of at least one role assigned to the user.
-
Specification